SOAP Authentication Bypass
An authentication bypass vulnerability exists that could allow a remote, unauthenticated attacker to invoke arbitrary methods that are available via the SOAP interface on the Cisco TelePresence Manager. The attacker would need the ability to submit a malformed SOAP request that is designed to trigger the vulnerability to the affected device on TCP port 8080 or 8443.

An attacker must perform a three-way TCP handshake and establish a valid session to exploit this vulnerability.

Java RMI Command Injection
A command injection vulnerability exists in the Java RMI interface that is exposed on the Cisco TelePresence Manager. The vulnerability could allow an unauthenticated, remote attacker to perform a number of actions on the device with elevated privileges. The attacker would need to be able to submit a crafted request to the affected device on TCP port 1100 or 32000.

An attacker must perform a three-way TCP handshake and establish a valid session to exploit these vulnerabilities.

Cisco Discovery Protocol Remote Code Execution
A remote code execution vulnerability exists in Cisco TelePresence Manager devices. This vulnerability could allow an unauthenticated, adjacent attacker to trigger a buffer overflow condition. The attacker would need the ability to submit a malicious Cisco Discovery Protocol packet to the affected system to exploit this vulnerability.

Because Cisco Discovery Protocol operates at Layer 2, an attacker must have a way to submit an Ethernet frame directly to an affected device. This submission may be possible in situations in which the affected system is part of a bridged network or connected to a nonpartitioned device, such as a network hub.

Patch Availability:
When considering software upgrades, also consulthttp://www.cisco.com/go/psirt
and any subsequent advisories to determine exposure and a complete upgrade solution.